Prerequisites

To enable SCIM provisioning, you need to first create an SSO integration that supports the SCIM provisioning option. After that integration is available, then you can enable the SCIM option and configure the settings specific to your SCIM application.

To begin the SCIM configuration, select Cloud user provisioning in Kantega SSO/your Atlassian application. Then select Okta under the SCIM header from the Add directory dropdown.

Step 1 Network preparation

To provision users and groups with SCIM, your identity provider must be able to reach SCIM endpoints in your Atlassian application (ie Jira). You will need to provide a https URL with a valid certificate.

image-20240424-131411.png

Step 2 Tenant configuration

SCIM users will be stored in a separate user directory in JIRA. Each directory has a unique tenant ID and URL used by the provider to push updates.

Enter a descriptive name for the SCIM directory and tenant configuration. Appears in the application directory list as "SCIM: <name>".

Make a note of the Application secret for later use in Configuring Okta. Use the suggested value or create your

Click Next.

image-20240424-131448.png

Step 3 Configure SCIM in Okta

You will use these values when configuring Okta

Replace the relevant parts of the value API server with the external proxy address, ie

Make a note of the application secret. While it can be changed later, you will not be able to see the value again, once you save.

Click Finish and switch to Configuration steps in Okta.

Configuration steps in Okta

  1. Login to the Okta admin portal

  2. Add integration

If you want to configure user provisioning with OIDC or SAML in the same app or another app, the Sign-on Options will be relevant. In this case tollow the setup guides for user provisioning with Okta

  1. Enable provisioning

  2. Enable API integration

  3. Configure To App settings

  4. Configure Assignments

  5. Configure Push Groups

    image-20240424-101311.png

Supported features

The following provisioning features are supported by Kantega SSO:

Create users: Users in Okta that are assigned to Kantega SSO within Okta are automatically added as users in the Kantega SSO application.

Update User Attributes: When user attributes are updated in Okta, they will be updated in Kantega SSO.

Deactivate Users: When users are deactivated in Okta, they will be deativated in Kantega SSO.

Push Groups: Groups and their users in Okta can be pushed to Kantega SSO.

Note that Okta group pushes into Kantega groups will not overwrite or remove non Okta provisioned users from the Kantega group.

Okta group pushes will be unable to "link" to existing Kantega groups, as JIRA does not allow the group name to be overwritten or changed.

Supported attributes

Display name

Variable name

Attribute Type

Data type

Display name

Variable name

Attribute Type

Data type

Username

userName

Group

string

Given name

givenName

Personal

string

Family name

familyName

Personal

string

Middle name

middleName

Personal

string

Email

email

Personal

string

email type

emailType

Personal

string

Display name

displayName

Personal

string

User type

userType

Group

string